References
- Singh, Harvinder, Anshu Bhasin, and Parag Kaveri. “SECURE: Efficient resource scheduling by swarm in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography 22.2 (2019): 127-137. doi: https://doi.org/10.1080/09720529.2019.1576334
- Pradeep Kumar Tiwari and Sandeep Joshi. Dynamic management of resources in cloud computing. International Journal of Software Innovation (IJSI), 8(1): 65–81, (2020). doi: https://doi.org/10.4018/IJSI.2020010104
- V Priya, C Sathiya Kumar, and Ramani Kannan. Resource scheduling algorithm with load balancing for cloud service provisioning. Applied Soft Computing, 76:416–424, (2019). doi: https://doi.org/10.1016/j.asoc.2018.12.021
- Shalu, and Dinesh Singh. “Artificial neural network-based virtual machine allocation in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography (2021): 1-12. doi: https://doi.org/10.1080/09720529.2021.1878626
- Mishra, Narendra, and R. K. Singh. “DDoS vulnerabilities analysis and mitigation model in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography 23.2 (2020): 535-545. doi: https://doi.org/10.1080/09720529.2020.1729503
- Top Threats Working Group et al. The treacherous 12: cloud computing top threats in 2016. Cloud Security Alliance, (2016).
- Dhara H Buch and Haresh S Bhatt. Trinetra: a solution to handle cross-vm time-driven attack. SN Applied Sciences, 2(4):1–12, (2020). doi: https://doi.org/10.1007/s42452-020-2297-z
- Sandeep Saxena, Goutam Sanyal, Shashank Srivastava, and Ruhul Amin. Preventing from cross-vm side-channel attack using new replacement method. Wireless Personal Communications, 97(3):4827–4854, (2017). doi: https://doi.org/10.1007/s11277-017-4753-7
- G Sangeetha and G Sumathi. An optimistic technique to detect cache based side channel attacks in cloud. Peer-to-Peer networking and Applications, pages 1–14, (2020).
- M Asim Mukhtar, Maria Mushtaq, M Khurram Bhatti, Vianney Lapotre, and Guy Gogniat. Flush+ prefetch: A countermeasure against access-driven cachebased side-channel attacks. Journal of Systems Architecture, 104:101698, (2020). doi: https://doi.org/10.1016/j.sysarc.2019.101698
- Sahan Bandara and Michel A Kinsy. Adaptive caches as a defense mechanism against cache side channel attacks. Journal of Cryptographic Engineering, pages 1–17, (2020).
- Biswabandan Panda. Cache based side-channel attacks. In Cyber Security in India, pages 65–69. Springer, (2020).
- Sasan Gharehpasha and Mohammad Masdari. A discrete chaotic multi-objective sca-alo optimization algorithm for an optimal virtual machine placement in cloud data center. Journal of Ambient Intelligence and Humanized Computing, pages 1–17, (2020).
- Sattar Feizollahibarough and Mehrdad Ashtiani. A security-aware virtual machine placement in the cloud using hesitant fuzzy decision-making processes. The Journal of Supercomputing, pages 1–31, (2020).
- Mishra, Narendra, and R. K. Singh. “Prioritisation and security defense algorithm for cloud specific vulnerability through scoring and base metric group.” Journal of Interdisciplinary Mathematics 23.2 (2020): 481-491. doi: https://doi.org/10.1080/09720502.2020.1731961
- Weichao Ding, Chunhua Gu, Fei Luo, Yaohui Chang, Ulysse Rugwiro, Xiaoke Li, and Geng Wen. Dfa-vmp: An efficient and secure virtual machine placement strategy under cloud environment. Peer-to-Peer Networking and Applications, 11(2):318–333, (2018). doi: https://doi.org/10.1007/s12083-016-0502-z
- Banavath Balaji Naik, Dhananjay Singh, and Arun Barun Samaddar. Secure virtual machine allocation against attacks using support value based game policy. International Journal of Communication Systems, 34(2):e4299, (2021) doi: https://doi.org/10.1002/dac.4299
- Yuhong Liu, Xiaojun Ruan, Songjie Cai, Ruiwen Li, and Hanxiao He. An optimized vm allocation strategy to make a secure and energy-efficient cloud against co-residence attack. In 2018 International Conference on Computing, Networking and Communications (ICNC), pages 349–353. IEEE, (2018).
- Atul Tripathi, Isha Pathak, and Deo Prakash Vidyarthi. Modified dragonfly algorithm for optimal virtual machine placement in cloud computing. Journal of Network and Systems Management, 28: 1316– 1342, (2020) doi: https://doi.org/10.1007/s10922-020-09538-9
- Varun Natu and Ta Nguyen Binh Duong. Secure virtual machine placement in infrastructure cloud services. In 2017 IEEE 10th Conference on Service-Oriented Computing and Applications (SOCA), pages 26–33. IEEE, (2017)
- Shankar, Vishnu, and Karan Singh. “Applications of attribute-based encryption in cloud computing environment.” Big Data Analytics. Springer, Singapore, 2018. 687-692.